CVE-2026-3336

7.5 HIGH

📋 TL;DR

A certificate validation bypass vulnerability in AWS-LC's PKCS7_verify() function allows unauthenticated attackers to bypass certificate chain verification when processing PKCS7 objects with multiple signers. This affects applications using AWS-LC that process PKCS7 objects. AWS service customers are not affected, but applications using AWS-LC directly must take action.

💻 Affected Systems

Products:
  • AWS-LC
Versions: Versions before 1.69.0
Operating Systems: All platforms supported by AWS-LC
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications that use PKCS7_verify() function with multiple signers. AWS services themselves are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could impersonate trusted entities, intercept encrypted communications, or bypass authentication mechanisms by presenting maliciously crafted PKCS7 objects.

🟠

Likely Case

Man-in-the-middle attacks where attackers intercept and modify PKCS7-signed data without proper certificate validation.

🟢

If Mitigated

Limited impact if applications have additional validation layers or don't process untrusted PKCS7 objects.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires crafting specific PKCS7 objects with multiple signers. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.69.0

Vendor Advisory: https://github.com/aws/aws-lc/security/advisories/GHSA-cfwj-9wp5-wqvp

Restart Required: Yes

Instructions:

1. Download AWS-LC version 1.69.0 from GitHub releases. 2. Replace existing AWS-LC installation with new version. 3. Recompile any applications that link against AWS-LC. 4. Restart affected services.

🔧 Temporary Workarounds

Disable PKCS7 processing

all

Temporarily disable PKCS7 object processing in applications if not required

Implement additional certificate validation

all

Add custom certificate validation logic before calling PKCS7_verify()

🧯 If You Can't Patch

  • Implement network segmentation to limit exposure of affected systems
  • Monitor for unusual PKCS7 processing activity and implement strict input validation

🔍 How to Verify

Check if Vulnerable:

Check AWS-LC version using ldd or dependency checking tools. If version is below 1.69.0 and application uses PKCS7_verify(), it is vulnerable.

Check Version:

ldd --version | grep aws-lc or check application's linked libraries

Verify Fix Applied:

Verify AWS-LC version is 1.69.0 or higher and test PKCS7 verification with multiple signers.

📡 Detection & Monitoring

Log Indicators:

  • Failed certificate validations for PKCS7 objects
  • Unexpected PKCS7 processing errors

Network Indicators:

  • Unusual PKCS7 object transmissions
  • Certificate validation bypass attempts

SIEM Query:

search for 'PKCS7_verify' errors or certificate validation failures in application logs

🔗 References

📤 Share & Export